SANS Institute

SANS Institute

Views:
2,688,311
Subscribers:
63,600
Videos:
1,140
Duration:
21:00:55:13
United States
United States

SANS Institute is an American YouTube content creator with at least 63.6 thousand subscribers. He published around 1.14 thousand videos which altogether total at least 2.69 million views.

Created on ● Channel Link: https://www.youtube.com/channel/UC2uPNhGken-ogEpJDi4ly6w





Top 100 Most Viewed Videos by SANS Institute


Video TitleViewsCategoryGame
1.SANS Emergency Webcast: What you need to know about the SolarWinds Supply-Chain Attack169,199
2.Information Security Training from SANS Institute - Student Testimonials112,147Guide
3.The Dark Arts of Social Engineering – SANS Security Awareness Summit 201888,069
4.How Threats Are Slipping In the Back Door - SANS ICS Security Summit 201785,569
5.SANS Institute | Level Up | How Do You Start In Cyber Security76,045
6.How to Present Cyber Security Risk to Senior Leadership | SANS Webcast73,576Guide
7.What do you need to know about the log4j (Log4Shell) vulnerability?64,594
8.Full Scholarship Cybersecurity Training With SANS55,243
9.Introduction to Malware Analysis54,078
10.Threat Hunting via Sysmon - SANS Blue Team Summit53,081
11.SANS Webcast - Zero Trust Architecture49,478
12.Real-Time OSINT: Investigating Events as They Happen | SANS OSINT Summit 202043,956
13.Russian Cyber Attack Escalation in Ukraine - What You Need To Know!41,373
14.The New SANS Live Training Experience41,277
15.Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 201940,413
16.Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk31,761Guide
17.Applied Data Science and Machine Learning for Cybersecurity - SANS Tactical Detection Summit 201830,236
18.The 20 Critical Security Controls: From Framework to Operational to Implementation29,149Guide
19.Introduction to Security Architecture29,024
20.Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk27,299Guide
21.Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK Framework26,068Guide
22.SANS Online Training25,555
23.Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 201723,229
24.SANS OnDemand Cyber Security Courses21,234
25.Weaponizing the Deep Web | SANS OSINT Summit 202019,784
26.SOLARWINDS – A SANS Lightning Summit18,497Guide
27.Leveraging Telegram for OSINT purposes | SANS@MIC Talk18,475Guide
28.Detecting and Defending Social Engineering Attacks18,221
29.SANS SEC503: Intrusion Detection In-Depth. Part-I18,116
30.SANS Webcast - YARA - Effectively using and generating rules16,566Show
31.SANS Live Online - New Online Training Platform16,412
32.Introduction to Linux15,736
33.Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 201915,182Guide
34.CISSP Cram Session14,809
35.SANS Class Prep Intro - What to complete prior to class14,593
36.SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture13,101Show
37.SANS Emergency Webcast: Follina MSDT (MS Word) 0-day - Analysis and Remediation w/ Jake Williams12,845Guide
38.A Sneak Peak at the New ICS41012,747
39.SANS Class Prep - Mounting an ISO file in Windows12,126Guide
40.SANS Class Prep - Mounting an ISO file in macOS12,096Guide
41.Creating a Cyber Secure Home11,651
42.SANS Class Prep - Systems Requirements11,639Guide
43.SANS Class Prep - Downloading your course materials11,455Guide
44.SANS VetSuccess Academy Overview11,060
45.Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling10,671
46.Ransoming Critical Infrastructure: Ransomware Attack on Colonial Pipeline - SANS Emergency Webcast10,650
47.Find_Evil - Threat Hunting | SANS@MIC Talk10,559
48.What You Need to Know About OpenAI's New ChatGPT Bot - And How it Affects Cybersecurity? SANS Panel10,449
49.CISSP Test-Taking Tactics: Successfully Navigating Adaptive Exams10,420
50.I Want to Work in Cybersecurity...Whatever That Means!9,886Guide
51.SANS Institute - Self Paced Online Training9,768
52.Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 20189,688
53.SANS Cyber Security Foundations Course9,551
54.What you need to know about SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis9,507
55.The SANS | GIAC Cybersecurity Training Experience: Get Ready for Something Phenomenal9,074
56.Job Role Spotlight: Cyber Threat Intelligence8,994
57.Welcome to SANS Community CTF - Services Challenges8,307
58.Kolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat Hunting8,146Guide
59.OSINT: Not Just Offensive - SANS Blue Team Summit7,836
60.CISSP® Prep Exam, MGT414, by SANS Institute7,834
61.SANS CyberStart7,817
62.Checkm8, Checkra1n and the new "golden age" for iOS Forensics | SANS@MIC Talk7,649
63.Exploring the Unknown Industrial Control System Threat Landscape – SANS ICS Security Summit 20177,405
64.Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them7,244Guide
65.Threat Hunting via DNS | SANS@MIC Talk7,227
66.SANS – Your Source for Cybersecurity Training – Live Online7,140
67.5-Day Blueprint for the Supercharged SOC: MGT551, Building & Leading Security Operations7,097
68.SANS Institute - GIAC Certifications7,071
69.CVE-2022-26809 MS-RPC Vulnerability Analysis - SANS Institute6,944
70.Purple Teaming Explained6,759
71.PowerShell 2020: State of the Art / Hack / Infection - SANS@Mic Keynote Network Security6,317
72.Introducing Core NetWars Continuous 26,094
73.Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them6,042
74.What’s New in SEC401: Security Essentials Bootcamp Style5,955
75.SANS Virtual Summits Will Be FREE for the Community in 20215,949
76.Hacking your SOEL: SOC Automation and Orchestration – SANS Security Operations Summit 20185,922
77.SANS Webcast - Consuming OSINT: Watching You Eat, Drink, and Sleep5,754Show
78.Latest Techniques in Hacking the Human | SANS Security Awareness Summit5,664
79.What you Need To Know About The Critical Citrix Gateway (Netscaler) Vulnerability CVE-2019-197815,457
80.SANS Live Online Testimonial Compilation5,363
81.Becoming a CISO: Leading Transformation5,350
82.Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking5,209
83.Top Cybersecurity Risks 20225,203
84.SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques5,167
85.SANS Holiday Hack Challenge 2021 Q&A with Ed Skoudis4,996
86.What you need to know about SEC530: Defensible Security Architecture and Engineering4,945
87.Ship of Fools: Shoring Up Kubernetes Security - SANS Secure DevOps Summit 20184,935
88.Making sense of SolarWinds through the lens of MITRE ATT&CK | STAR Webcast4,886Show
89.SANS Webcast - Perimeter Security and Why it is Obsolete4,596Show
90.SANS Cybersecurity Programs for the Department of Defense4,437
91.What you need to know about SEC503: Intrusion Detection In-Depth4,349
92.SEC503: Intrusion Detection In-Depth. Part II4,342
93.Hands-On Learning: How and Why You Should Build a Home Lab4,275Preview
94.The Foundation of Accelerating your Cybersecurity Career - SANS@Mic Keynote w/ James Lyne4,203
95.Key Take-Aways from SEC401: Security Essentials Bootcamp Style4,171
96.Why Level Up with SANS SEC401?4,158
97.The Amazingly Scary XZ SSHD Backdoor4,106
98.Vulnerabilities and reports and metrics, oh my!4,083
99.Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS3,982
100.Demo: The Ukraine Event In a Box – SANS ICS Security Summit 20173,936